Secure Boot and TPM 2.0 work together to make sure your PC starts in a trusted state and stays harder to tamper with, which is why they’re now required by things like Windows 11 and modern anti‑cheat systems. Think of Secure Boot as checking the “signature” of what runs at boot, and TPM 2.0 as the small, protected vault that stores keys and measurements of that boot process.

Secure Boot and TPM 2.0 – Quick Scoop

What Secure Boot actually does

Secure Boot is a UEFI firmware feature that only allows signed, trusted bootloaders and OS components to run during startup.

  • It checks each boot component’s digital signature before it runs.
  • If something is modified (like a bootkit), the signature check fails and the firmware blocks it.
  • It requires UEFI mode and a GPT disk; legacy BIOS and MBR usually cannot use Secure Boot.

A simple way to picture it: Secure Boot is the bouncer at the club entrance, only letting in guests on the approved list.

What TPM 2.0 actually is

TPM (Trusted Platform Module) 2.0 is a secure cryptographic chip or firmware block that the OS can use to store keys and verify system integrity.

  • It can be a discrete chip (dTPM), firmware TPM in the CPU (Intel PTT, AMD fTPM), or part of a security processor.
  • It securely stores encryption keys and “measurements” of boot components so malware cannot easily steal or fake them.
  • It has protections like anti‑hammering: too many wrong authorization attempts can temporarily lock it.

On Windows, TPM 2.0 underpins features like BitLocker, Measured Boot, and remote attestation.

How Secure Boot and TPM 2.0 work together

While they are separate features, they complement each other for a stronger chain of trust from power‑on to login.

  • Secure Boot: ensures only trusted, signed code runs during boot (stops unauthorized bootloaders and low‑level malware).
  • TPM 2.0: records cryptographic measurements of each stage (Measured Boot) and stores keys that depend on those measurements.
  • Together, they allow the system or remote services (like anti‑cheat or enterprise management) to verify that the machine booted in a known‑good state.

Modern games like Call of Duty and other competitive titles explicitly require both TPM 2.0 and Secure Boot so their anti‑cheat (for example RICOCHET) can trust the environment.

Why they’re such a trending topic now

In the last few years, Secure Boot and TPM 2.0 have shifted from “nice optional security” to “hard requirements” for popular software.

  • Windows 11 requires TPM 2.0 and Secure Boot for supported installs, which sparked huge forum discussions and guides about enabling them on older boards.
  • Newer anti‑cheat systems in games (Battlefield, Fortnite, Valorant, Call of Duty) flag or even block you if either Secure Boot or TPM is missing or off.
  • PC help forums are full of threads like “TPM 2.0 & Secure Boot not detected/supported, what do I do?” and “Help me understand Secure Boot and TPM.”

A common pattern in these discussions is people discovering that their hardware actually supports these features, but they are disabled in firmware or the system is still using legacy BIOS and MBR.

Mini how‑to (conceptual, not step‑by‑step)

Most current systems that support Windows 11 or modern AAA games can enable both features with a few BIOS/UEFI tweaks.

  1. Switch to UEFI and GPT
    • Boot mode must be UEFI and the disk partition style usually needs to be GPT for Secure Boot.
  1. Enable TPM 2.0
    • On Intel boards, look for options like “Intel PTT” or “PTT” and enable them.
 * On AMD boards, look for “AMD fTPM”, “AMD CPU fTPM” or similar and turn it on.
  1. Turn on Secure Boot
    • In UEFI, enable Secure Boot and save changes.
 * Back in Windows, tools like System Information (msinfo32) can confirm Secure Boot is on and TPM is present.

Forum posts and guides often emphasize backing up data and checking your motherboard manual before changing boot mode or converting MBR to GPT to avoid boot issues.

Quick HTML table: Secure Boot vs TPM 2.0

html

<table>
  <thead>
    <tr>
      <th>Feature</th>
      <th>Main role</th>
      <th>Where it lives</th>
      <th>Typical modern use</th>
    </tr>
  </thead>
  <tbody>
    <tr>
      <td>Secure Boot</td>
      <td>Verifies only signed, trusted bootloaders/OS components run at startup.[web:3]</td>
      <td>UEFI firmware setting on the motherboard.[web:3]</td>
      <td>Required for Windows 11, used by anti‑cheat to ensure trusted boot path.[web:3][web:4]</td>
    </tr>
    <tr>
      <td>TPM 2.0</td>
      <td>Stores keys and records integrity measurements of boot components.[web:1][web:5]</td>
      <td>Discrete chip or firmware TPM (Intel PTT, AMD fTPM) on CPU/platform.[web:1][web:3]</td>
      <td>BitLocker, Measured Boot, OS attestation, game anti‑cheat checks.[web:1][web:3][web:7]</td>
    </tr>
  </tbody>
</table>

Information gathered from public forums or data available on the internet and portrayed here.